Publication | Closed Access
Your state is not mine
51
Citations
18
References
2017
Year
Unknown Venue
EngineeringInformation SecurityState LawLawAdministrative LawHardware SecurityDenial-of-service AttackTcp StateNetwork SecurityInternet SecurityData PrivacyFirewall (Computing)Computer ScienceData SecurityOutside ChinaState CrimeCryptographyInternet ProtocolCloud ComputingGreat Firewall
Understanding the behaviors of, and evading state-level Internet-scale censorship systems such as the Great Firewall (GFW) of China, has emerged as a research problem of great interest. One line of evasion is the development of techniques that leverage the possibility that the TCP state maintained on the GFW may not represent the state at end-hosts. In this paper we undertake, arguably, the most extensive measurement study on TCP-level GFW evasion techniques, with several vantage points within and outside China, and with clients subscribed to multiple ISPs. We find that the state-of-the art evasion techniques are no longer very effective on the GFW. Our study further reveals that the primary reason that causes these failures is the evolution of GFW over time. In addition, other factors such as the presence of middleboxes on the route from the client to the server also contribute to previously unexpected behaviors.
| Year | Citations | |
|---|---|---|
Page 1
Page 1